Skip to content

Basic Internet Access Setup

Overview

This guide explains how to configure a RansNet router for basic Internet access. After completing this guide:

  • WAN connectivity — The router obtains Internet access from your ISP
  • LAN services — Local devices receive IP addresses automatically via DHCP
  • Internet access — LAN users can access the Internet through the router's NAT firewall

Use Cases

This deployment is suitable for:

  • Small offices — Branch locations with 10–50 users
  • Retail shops — Point-of-sale systems and customer Wi-Fi
  • Temporary sites — Construction, events, or short-term deployments
  • Maritime cabins — Remote locations with 4G/5G backup
  • Basic branch connectivity — Entry-level SD-WAN branch router
  • Testing and lab environments — Development and proof-of-concept setups

Requirements

  • RansNet router — Any model (HSA-520, UA-520, XE-300, or UAP-520)
  • ISP modem or upstream Internet access — Fiber ONT, cable modem, or 4G/5G connection
  • Ethernet cable — For connecting devices to LAN ports
  • DHCP or static IP — ISP provides either dynamic (DHCP) or static IP on WAN link
  • Optional: Wi-Fi — For wireless client connectivity (2.4 GHz and/or 5 GHz)

Topology Description

The basic setup consists of three network segments:

Basic Network Topology

Key components:

  • WAN (eth0) — Uplink to ISP; obtains IP via DHCP or static configuration
  • LAN (vlan1) — Local network on ports LAN1–LAN4; default subnet is 192.168.8.0/22
  • DHCP Server — Automatically assigns addresses to LAN clients in the range 192.168.8.10–192.168.11.254
  • NAT/Firewall — Hides private LAN addresses and protects against unsolicited inbound traffic
  • Optional Wi-Fi — Wi-Fi 0 (2.4 GHz) and Wi-Fi 1 (5 GHz) broadcast to the same LAN network

Configuration Methods

You can configure the router using either method:

  • CLI via Console or SSH — Connect directly to the router's console port or SSH to its IP address. Refer to Device Bootstrapping for console access instructions.
  • mFusion GUI — Provision the router through the mFusion management portal for centralized, web-based configuration. Refer to Device Provisioning for setup steps.

Refer to Getting Started for detailed device access and management instructions.

Note

RansNet routers ship with factory defaults that provide zero-touch provisioning, eg. out of the box, it provides Internet access and auto contacts RansNet cloud mfusion for remote orchestration.

The configuration steps below walk through these default settings and show where to customize them for your specific ISP and network. If you need to clear all configuration and reconfigure the router to start from scratch, enter enable mode and execute below cmd (Access the router via console only — SSH access will be lost after reboot.):

write erase all
reboot
The router will reboot with a blank configuration, and you can reconfigure using the steps below.


Step 1: Configure WAN Connection

The WAN (Wide Area Network) interface connects your router to the ISP link — typically a fiber ONT (Optical Network Terminal).

Refer to Ethernet Interfaces for detailed WAN port configuration.

DHCP Mode (Default)

Most ISP links use DHCP to assign the CPE (Customer Premises Equipment) a dynamic IP address and default route. This is the default configuration:

interface eth0
  description "Connection to WAN"
  enable
  ip address dhcp
!

The router will receive a public (or private) IP address and automatically install a default route toward the ISP gateway.

Static IP Mode

If your ISP provides a static IP address, configure the interface with the static IP and install an explicit default route:

interface eth0
  description "Connection to WAN"
  enable
  ip address 61.13.198.166/30
!
ip route 0.0.0.0/0 nexthop 61.13.198.165

Refer to Static Routes for complete static routing configuration details.

Cellular Backup

To use 4G/5G as a backup WAN link, enable the WWAN interface:

interface wwan0
  enable
!

See WWAN Interfaces for SIM configuration, registration, and failover setup.


Step 2: Configure LAN and DHCP (and DNS)

The LAN (Local Area Network) is the private network serving users and devices. On HSA series routers, the default LAN (vlan1) includes all four LAN ports (LAN1 through LAN4). A static IP address on the LAN interface serves as the gateway for client devices, and the built-in DHCP server automatically issues private IP addresses and DNS server IPs to connected hosts.

interface vlan 1 1
  description "Default VLAN for all LAN ports"
  enable
  ip address 192.168.8.1/22
  dhcp-server
    router 192.168.8.1
    dns 8.8.8.8 8.8.4.4
    range 192.168.8.10 192.168.11.254
    enable
!

Refer to VLAN Interfaces for detailed VLAN configuration and switchport assignment for each VLAN.

Refer to DHCP Server for advanced DHCP options such as reserved leases, name servers, domain name assignment, and NTP configuration.


Step 3: Configure NAT/Firewall Rules

The RansNet router functions as a firewall, protecting your private network from unauthorized inbound traffic while allowing outbound access to the Internet. By default, all inbound connections are blocked.

Outbound Access Control

Permit outbound traffic on the WAN and cellular interfaces:

firewall-access 100 permit outbound eth0
firewall-access 101 permit outbound wwan+
!

Source NAT (SNAT)

To hide your private LAN IP addresses from the Internet, the router translates outbound source IPs to the WAN interface IP. This masquerading allows return traffic to route back to the correct clients and enables bidirectional communication:

firewall-snat 100 overload outbound eth0
firewall-snat 101 overload outbound wwan+
!

Refer to Firewall Policies for advanced access controls and object definitions.

Tip

The factory default configuration includes a firewall rule allowing SSH access from the LAN subnet (192.168.8.0/22) on port 22. This permits remote management via SSH from trusted LAN clients while blocking unsolicited inbound connections from the Internet. Never expose SSH or other management services to the WAN — restrict management access to the LAN only.


Step 4 (Optional): Configure Wi-Fi

Enable wireless connectivity to allow users to access the Internet without wired connections. Wireless clients are automatically assigned DHCP IP addresses from the same LAN subnet as wired clients (default VLAN1 for HSA/UA-520 series).

interface wifi 0
  ssid corpnet
  encryption WPA2-PSK key pskpassword
  enable
!
interface wifi 1
  ssid corpnet
  encryption WPA2-PSK key pskpassword
  enable
!

Refer to Wireless Interfaces for SSID configuration, encryption modes, channel selection, and multi-SSID setups.


Model-Specific Differences

This guide uses HSA-520 as the example. If you're using a different model, note these differences:

Model WAN Interface LAN Ports Notes
HSA-520 / UA-520 eth0 LAN1-4 on vlan1 Standard setup as shown in this guide.
XE-300 WAN/LAN1 (vlan2) LAN2-4 on vlan1 Important: XE-300 maps WAN to vlan2 and LAN to vlan1 (opposite of older versions). See XE-300 Default Configuration in release notes.
UAP-520 eth0 LAN1-4 on vlan1 Similar to HSA-520; includes built-in access point. Wi-Fi configuration available on the device.

Refer to Product Overview for complete hardware specifications and port assignments by model.


Factory Default Configuration

RansNet routers ship with a complete default configuration that provides immediate Internet connectivity without any manual changes. The configuration below shows the factory defaults for HSA-520 devices running out of the box:

!
hostname HSA-520
!
interface eth0
  description "Connection to WAN"
  enable
  ip address dhcp
!
interface eth1
  description "DO NOT configure"
  enable
!
interface vlan 1 1
  description "Default VLAN for all LAN ports"
  enable
  ip address 192.168.8.1/22
  dhcp-server
    router 192.168.8.1
    dns 8.8.8.8 8.8.4.4
    range 192.168.8.10 192.168.11.254
    enable
!
interface wwan0
  enable
!
ip name-server 8.8.8.8 8.8.4.4
!
firewall-input 100 permit all tcp src 192.168.8.0/22 dport 22
!
firewall-access 100 permit outbound eth0
firewall-access 101 permit outbound wwan+
!
firewall-snat 100 overload outbound eth0
firewall-snat 101 overload outbound wwan+
!

This default configuration enables: - WAN connectivity via DHCP on eth0 - LAN connectivity with private IP range 192.168.8.0/22 and DHCP server - Cellular backup with wwan0 enabled - Firewall protection with management access restricted to SSH (port 22) from the LAN subnet and outbound NAT masquerading - DNS resolution using Google's public DNS servers (8.8.8.8, 8.8.4.4)

No additional configuration is required for basic Internet access — simply connect the WAN port to your ISP link and connect client devices to the LAN ports or wireless network.


Verification and Testing

After completing the configuration, verify that all components are operational. Connect a PC to one of the LAN ports, and console/SSH to the router to run the tests below.

Items to Test Command Expected Outcome
WAN Interface Status show interface eth0 (fiber) or show interface wwan0 (cellular) Interface shows UP status with a valid IP address. For DHCP, IP is assigned by ISP; for static IP, matches your configuration. See Ethernet Interfaces Verification.
Default Route show ip route Default route 0.0.0.0/0 exists with ISP gateway as next-hop or via cellular interface. See Static Routes Verification.
LAN Interface show interface vlan1 Interface shows UP status with IP address 192.168.8.1/22. See VLAN Interfaces Verification.
DHCP Server Status show ip dhcp-server DHCP server is enabled and running. See DHCP Server Verification.
DHCP Active Leases show ip dhcp-lease Connected clients have IP addresses in range 192.168.8.10–192.168.11.254.
Firewall Access Rules show firewall access-list Rules permit outbound traffic on eth0 and wwan+. See Firewall Policies.
NAT Rules show firewall snat-list SNAT rules show overload (masquerading) configured for outbound interfaces.
Wireless Status (if configured) show interface wifi Both 2.4 GHz and 5 GHz SSIDs show UP and are broadcasting. See Wireless Interfaces Verification.
Wireless Clients (if configured) show interface wifi clients Connected clients appear with valid IP addresses from LAN range; signal strength (RSSI) is reasonable (-30 to -80 dBm).
Connectivity to ISP Gateway ping <ISP-gateway-IP> Ping succeeds with reasonable latency (< 50 ms).
Connectivity to Public DNS ping 8.8.8.8 Ping succeeds, confirming end-to-end Internet access.
DNS Resolution nslookup google.com or dig google.com DNS queries resolve successfully and return IP addresses. Confirms DNS servers are reachable and responding.
Routing Path to Internet traceroute www.google.com Traceroute shows path through ISP gateway to destination.
Internet Throughput run speedtest Throughput is close to ISP provisioned speed (up to 1 Gbps on HSA, limited by ISP connection).

Troubleshooting Common Issues

Symptom Likely Cause Solution
WAN interface stays DOWN or doesn't get DHCP IP ISP link not connected, or DHCP request rejected Verify fiber/4G link is connected and active. Check ISP for DHCP relay or authentication requirements. Power cycle the router and ISP modem.
WAN has IP but no Internet access Default route not installed, or ISP requires additional configuration Run show ip route to confirm default route exists. Some ISPs require PPPoE or additional gateway configuration.
LAN clients don't receive DHCP leases DHCP server not running or VLAN misconfigured Verify DHCP is enabled in vlan1 config. Check that LAN ports are assigned to vlan1 using show interface switchport.
DNS resolution fails (nslookup times out) DNS servers unreachable or not configured in DHCP Verify DNS servers are configured in DHCP server section (dns 8.8.8.8 8.8.4.4). Test with ping 8.8.8.8 to confirm ISP link is working.
Clients connect to Wi-Fi but have no Internet Wireless VLAN not bridged to LAN, or firewall rules blocking traffic Verify wireless SSID is assigned to vlan1 (or the correct LAN VLAN). Check firewall access rules permit outbound traffic on eth0/wwan0.
Can't reach router management (192.168.8.1) Router IP is different (static config overrode default), or LAN interface is down Run show interface vlan1 to confirm the configured IP. Verify vlan1 is UP. Reconfigure if needed, or perform a factory reset.
Firewall blocking legitimate traffic Firewall rules too restrictive or outbound rule missing Run show firewall access-list to review rules. Ensure firewall-access rules permit the required traffic. By default, all inbound is blocked (intended).
Throughput lower than expected MTU mismatch, interference (wireless), or ISP speed limitation For PPPoE or certain ISP links, reduce router MTU to 1492. Check wireless signal strength and channel interference. Contact ISP to confirm provisioned speed.

Best Practices & Configuration Notes

Time Synchronization (NTP)

The router uses NTP to maintain accurate system time, which is essential for certificate validation, logging, and scheduled tasks. Verify NTP is working:

show ntp status

The factory config uses the system default NTP servers. If your network is isolated, configure a local NTP server or manually set the time.

MTU Configuration

For most deployments, the default MTU of 1500 bytes is correct. However, some ISPs (particularly PPPoE) require MTU 1492:

  • Fiber/Ethernet: MTU 1500 (default)
  • PPPoE: MTU 1492 (reduces TCP throughput by ~4%)
  • 4G/5G: Varies by carrier; typically 1500

If you experience packet fragmentation or connection issues, request your ISP's required MTU.

Performance Expectations

Model Firewall Throughput VPN Throughput Notes
HSA-520 1 Gbps 200 Mbps (IPSec) / 300 Mbps (WireGuard) Enterprise branch model; supports up to 100 concurrent devices.
UA-520 1 Gbps 200 Mbps (IPSec) / 300 Mbps (WireGuard) Premium branch with 5G support; 100 concurrent devices.
XE-300 100 Mbps 10 Mbps (IPSec) / 20 Mbps (WireGuard) Ultra-compact industrial IoT model; limited to 20 concurrent devices due to form factor.

Actual throughput depends on ISP provisioning, firewall rule complexity, feature load (encryption, inspection, traffic shaping), and device capacity. For detailed specifications, refer to Product Overview.

Security Best Practices

  • Never expose management services to WAN — SSH and GUI access are restricted to LAN by default. Maintain this configuration.
  • Use strong passwords — Change default credentials and use passphrases for Wi-Fi encryption.
  • Keep firmware updated — Deploy security patches promptly. Refer to Release Notes for available updates.
  • Enable firewall logging (optional) — For troubleshooting, enable firewall logs: firewall-input log, firewall-access log.
  • Restrict inbound access — The factory config blocks all inbound except SSH from LAN. Add rules only for required services.
  • Device hardening — For comprehensive security hardening beyond basic setup, refer to Device Hardening for authentication, certificate management, and advanced security practices.

After all configuration and testing pass, under enable mode write memory to save your configuration.